The correct answer is 'Create and implement a documented security configuration baseline'. This is because before deploying new servers or any computing resources, it is essential to have a standard, documented configuration that aligns with organizational security policies. This security configuration baseline serves as a reference point to ensure all systems start from a secure state. Using industry best practices as a guide does not guarantee alignment with the specific organization's policies, which is why it is not the best initial step. Scanning the servers with a vulnerability scanner after deployment or conducting a security awareness training for IT staff are important practices, but they come after establishing a baseline for system configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a security configuration baseline?
Open an interactive chat with Bash
Why is documentation important in security configuration?
Open an interactive chat with Bash
What are industry best practices in server configuration?